2019
DOI: 10.1049/iet-gtd.2018.6317
|View full text |Cite
|
Sign up to set email alerts
|

Development of cloud‐based power system operational data management system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Cloud computing proposes a valuable solution for managing IoT services and tackling applications and service composition [53]. Consequently, it is obvious that the combination of IoT and cloud computing has been reached its maximum in recent years [54,55]. This trend has reflected on several surveys [56][57][58], and consequently products [59].…”
Section: Combination Of Cloud and Iotmentioning
confidence: 99%
“…Cloud computing proposes a valuable solution for managing IoT services and tackling applications and service composition [53]. Consequently, it is obvious that the combination of IoT and cloud computing has been reached its maximum in recent years [54,55]. This trend has reflected on several surveys [56][57][58], and consequently products [59].…”
Section: Combination Of Cloud and Iotmentioning
confidence: 99%
“…For decrypting the ciphertext to plaintext, the other key, i.e. the private key, is used [12]. Due to the higher algorithmic complexity of the RSA algorithm, hardware implementation of the RSA algorithm is difficult.…”
Section: Data Security and Encryptionmentioning
confidence: 99%
“…The plaintext, M and ciphertext, C are interrelated as C = M e mod n and M = C d mod n , where d and e are the values provided by the two users located at encryption and decryption end. The public key (PU = { e , n }) and private key (PR = { d , n }) can be is generated from two prime numbers ( a and b ) by following the given steps [12]. (i) Determine n : = a * b and x : = ( a −1)*( b −1). (ii) e : = Any prime number between 1 and x.…”
Section: Data Security and Encryptionmentioning
confidence: 99%
See 2 more Smart Citations